|
Search the dblp DataBase
Kunihiko Miyazaki:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai
Digitally signed document sanitizing scheme based on bilinear maps. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:343-354 [Conf]
- Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:428-439 [Conf]
- Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki
A Multi-OS Approach to Trusted Computer Systems. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:107-114 [Conf]
- Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi Sasaki
Legally Authorized and Unauthorized Digital Evidence. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2002, pp:67-73 [Conf]
- Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:239-246 [Journal]
- David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki, Kazuo Takaragi, Burkhart Wolff
Verifying a signature architecture: a comparative case study. [Citation Graph (0, 0)][DBLP] Formal Asp. Comput., 2007, v:19, n:1, pp:63-91 [Journal]
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. [Citation Graph (, )][DBLP]
A Study on Multi-Resipient Encryptions for Selective Disclosure. [Citation Graph (, )][DBLP]
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC. [Citation Graph (, )][DBLP]
Cryptographic Approch for Workflow Systems. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|